Il 08 gen 2017 08:31, Meng Xu <xumengpa...@gmail.com> ha scritto:
[cc. Dario and George]

On Fri, Jan 6, 2017 at 1:34 PM, wy11 <w...@rice.edu> wrote:
> Dear Xen developers,

Hi,

>
> Recently I read a paper about possible theft of service attacks in Xen
> hypervisor.
>
> https://arxiv.org/pdf/1103.0759.pdf

I quickly read it. It is interesting to see that EC2 suffers from such issue.
According to 4.1, it seems to me that this is more like a scheduler
"bug" in budget accounting logic.

It's from March 2011. I was pretty new to Xen at the time, I'm sure George 
knows better.

IIRC, is that it's a known attack vector and it's been fixed. I can look at the 
paper and dig in the code and find proper references during during this coming 
week, when back from time-off, but you probably can verify it yourself, if you 
look carefully.

When the attack VCPU wake up, the scheduler should starts to counting
all time consumed from now on for the attack VM, instead of the victim
VM. When the attack VCPU sleeps, the scheduler should accounts the
budget consumed for the attack VM.

In the event-driven RTDS scheduler, this issue should not happen. The
scheduler did account the budget for the correct VMs, IIRC.
Is there any experiment showing that RTDS scheduler suffers this issue?

I'm sure this is not an issue for neither RTDS nor Credit2. But it's most 
likely not an issue any longer either for Credit.

Refards, Dario

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

Reply via email to